General

  • Target

    f6dbc0af194901f301d17f764283deeefe73a0e0a2170939c6a4f24dae77a200.bin

  • Size

    388KB

  • Sample

    241029-1zhk3a1bjb

  • MD5

    a8999298570f1c53df49387de7fc919c

  • SHA1

    18a5211e1896cd2c2e4d2ec8adfbab1b0e042bf6

  • SHA256

    f6dbc0af194901f301d17f764283deeefe73a0e0a2170939c6a4f24dae77a200

  • SHA512

    c157632fb4a7cfc95d5c98ef9472951b0c3349a2bcec123b5f5d7753ac84337a686a51381c8f65915e417bf8ecc9076c2caa65a2b752e5ddbfbce56522ad2a0c

  • SSDEEP

    12288:iCRtMWnGhxTj5Vugdl8Q6ODaD4hDyosaiQjXWq:jwhR5VugkD4hdp5

Malware Config

Targets

    • Target

      f6dbc0af194901f301d17f764283deeefe73a0e0a2170939c6a4f24dae77a200.bin

    • Size

      388KB

    • MD5

      a8999298570f1c53df49387de7fc919c

    • SHA1

      18a5211e1896cd2c2e4d2ec8adfbab1b0e042bf6

    • SHA256

      f6dbc0af194901f301d17f764283deeefe73a0e0a2170939c6a4f24dae77a200

    • SHA512

      c157632fb4a7cfc95d5c98ef9472951b0c3349a2bcec123b5f5d7753ac84337a686a51381c8f65915e417bf8ecc9076c2caa65a2b752e5ddbfbce56522ad2a0c

    • SSDEEP

      12288:iCRtMWnGhxTj5Vugdl8Q6ODaD4hDyosaiQjXWq:jwhR5VugkD4hdp5

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks